// For flags

CVE-2019-5170

 

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file.At 0x1e87c the extracted hostname value from the xml file is used as an argument to /etc/config-tools/change_hostname hostname=<contents of hostname node> using sprintf(). This command is later executed via a call to system().

Se presenta una vulnerabilidad de inyección de comando explotable en la función "I/O-Check" del servicio iocheckd de WAGO PFC 200 en la versión de firmware 03.02.02(14). Un archivo cache XML especialmente diseñado escrito en una ubicación específica en el dispositivo puede ser usado para inyectar comandos de Sistema Operativo. Un atacante puede enviar un paquete especialmente diseñado para activar el análisis de este archivo cache. En 0x1e87c, el valor de nombre de host extraído del archivo xml es usado como argumento para /etc/config-tools/change_hostname hostname= usando la función sprintf(). Este comando luego es ejecutado por medio de una llamada a la función system().

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-01-04 CVE Reserved
  • 2020-03-11 CVE Published
  • 2023-07-15 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Wago
Search vendor "Wago"
Pfc200 Firmware
Search vendor "Wago" for product "Pfc200 Firmware"
03.02.02\(14\)
Search vendor "Wago" for product "Pfc200 Firmware" and version "03.02.02\(14\)"
-
Affected
in Wago
Search vendor "Wago"
Pfc200
Search vendor "Wago" for product "Pfc200"
--
Safe